This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/7045] user-space probe x86 on x86-64 host
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 8 Dec 2008 15:33:55 -0000
- Subject: [Bug translator/7045] user-space probe x86 on x86-64 host
- References: <20081124155752.7045.fche@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From dsmith at redhat dot com 2008-12-08 15:33 -------
(In reply to comment #4)
> Yeah
> stap -e 'probe process("./hello").function("*").call {}' failed due to
> mismatched elf.
>
> But
> stap -e 'probe process("./hello").syscall {}' gets rid of the checking elf.
Here's a small clarification of the last example above (the ".syscall" one).
That example doesn't check the debuginfo because it doesn't need debuginfo
(internally that example uses utrace which doesn't require debuginfo). So, the
fact that the .syscall probe doesn't check matching debuginfo is by design.
--
http://sourceware.org/bugzilla/show_bug.cgi?id=7045
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.